700 million e-mails and passwords have just been leaked: Here a hacker gives five fifs that secures you against the internet rogues

Last week it emerged that millions and emails and passwords had come in the claws of several hackers. Here you get five good tips for what you do if your data has been stolen – and how to avoid it happening again.

Many people have probably gone past the haveibeenpwned.com page to see if they were part of the large-scale leak that revealed 770 stolen emails and 22 million passwords.

For those who have been stolen their data, there is good reason to take a number of precautions.

Strong passwords are crucial for making life hard for hackers who are looking for your online data.

Enable two factor authentication for all the services you use: Apple ID, Twitter, Gmail, Facebook, Office365. It ensures that someone who has downloaded your password cannot log in to your services without another factor, usually something dynamic, such as. A “one time password”

Recommendations if your information has been leaked

Change passwords.

Use a password manager to annoy and manage your passwords.

Activate two factor authentication.

Use Google Authenticator, Microsoft Authenticator, or other offline authentication codes.

Create mail aliases for specific usage situations.

Prefer not to use SMS passwordsThere are several services that allow for two-factor authentication such as Google and Microsoft Authenticator. However, there is one option one should be careful with.

“SMS passwords should be your last resort and have their own problems but are still better than not having 2FA,”

Also, not to use the same password in multiple places and to Get started using a password manager

, because it has a different smart function than just remembering complicated passwords.

“Use the password manager to generate random passwords for you. Random passwords are important. And sorry, but you’re not the creative type when it comes to passwords and remembering them. ”Also

When it comes to email addresses, however, it becomes a bit more difficult. But there is something you can do to make yourself better.

If you happen to have control over your own email infrastructure or if you use a service that allows it: Create aliases for specific usage situations, so when a break occurs, the attacker will not have all the information on you or you makes it harder to correlate the data. It is a great advantage to set up different e-mail accounts for different purposes.